Method and system for VLAN aggregation

17 downloads 120 Views 1MB Size Report
Feb 2, 2005 ... NW9 0 0 0 0. i i i i i. V i. 141 142 143 144 145 146. 151 152. VLAN A. 1 H1. 11_(). \ i. 111 112 113. VLAN B. 121 122. VLAN C. H6. H7 ' H8 u.
US007792058B1

(12) Ulllted States Patent

(10) Patent N0.:

Yip et al. (54)

(75)

US 7,792,058 B1

(45) Date of Patent:

AGGREGATION

METHOD AND SYSTEM FOR VLAN

5,793,763 A 5,802,106 A

Inventors: Michael Yip, Sunnyvale, CA (US);

5’862’452 A

1/1999 Cudak et a1’

5’909’686 A

6/1999 Muller et 31'

Shehzad T. Merchant, Mountain View,

*Sep. 7, 2010

8/1998 Mayes et al. 9/1998 Packer

CA (US); Kenneth T. Yin, Rumson, NJ

(US); Eric Knudstrup, Saratoga, CA (US)

.

(Continued)

(73) Ass1gnee: Extreme Networks, Inc., Santa Clara, CA (US) .

(*)

_

.

Nonce'

.

.

OTHER PUBLICATIONS _

IEEE Std 802.1Q-l998, “IEEE Standards for Local and Metropolitan

SubJeCt. to any dlsclalmer’. the term Ofthls

Area Networks: Virtual Bridged Local Area Networks,” New York,

patent is extended or adjusted under 35 U.S.C. l54(b) by 770 days.

NeWYOrk 1999 ’ '

C t' d ( on mue )

This patent is subject to a terminal dis-

claimer.

Primary ExamineriDaniel J. Ryman

'

Assistant ExamineriNishant B Divecha

(21) Appl' NO" 11/050’165

(74) Attorney, Agent, or FirmiBlakely Sokoloff Taylor &

(22)

Zafman

Filed:

Feb. 2, 2005 Related US. Application Data

(57)

ABSTRACT

(63)

Continuation of application No. 09/595,608, ?led on

(51)

Jun‘ 16’ 2000’ HOW Pat‘ NO‘ 6914905‘ Int Cl H04L 12/28 (200601)

A method and system for an aggregated virtual local area network (VLAN) architecture in which several VLANs in a network share the same default router address and subnet

(52)

H04L 12/56 (200601) H04] 3/24 (200601) H04] 3/26 (2006.01) US. Cl. ..................... .. 370/255; 370/390; 370/392;

mask, but remain isolated from one another’ s network traf?c. Instead of the traditional method of assigning one subnet to a VLAN, eachVLAN is assigned only a portion of a subnet’ s IP address space, and is further grouped into a super-VLAN

370/395-53; 370/401; 370/432; 370/473

uniquely associated with that subnet. lntra-VLAN tra?ic is

(58)

Field Of Classi?cation Search ............... .. 370/390,

forwarded only to host IP addresses assigned to that same

370/432, 254: 255: 389: 392: 400: 401: 395:

VLAN according to a VLAN identi?er carried in the data

_

_

_

370/473

packet. Inter-VLAN traf?c is processed by a virtual router

See apphcanon ?le for Complete Search hlstory' (56) References Cited

interface which routes the data packet by applying the routing con?guration for the subnet uniquely associated with the super-VLAN, according to a super-VLAN identi?er carried in the data packet.

US. PATENT DOCUMENTS

5,732,078 A

3/1998 Arrango

5,737,333 A 5,742,604 A

4/1998 Civanlar et a1. 4/1998 Edsall et al.

22 Claims, 3 Drawing Sheets

SIM-‘92.1.1

sue 19 1 :11

1 \ 312 31a

1921 14-5

321

322

suavum R

192116-8 231

332

33a

US 7,792,058 B1 Page 2 Us. PATENT DOCUMENTS 5,910,955 5,926,463 5,938,736 5,946,308

A A A A

6/1999 7/1999 8/1999 8/1999

Nishimuraetal. Ahearn etalMuller er 91Dobbins er a1~

5,949,783 A

9/1999 Husak etal-

5,959,989 A 5,968,126 A

9/1999 Gleeson et al. 10/1999 Ekstrom et al.

6,178,455 6,178,505 6,181,681 6,181,699 6,182,226 6,182,228

B1 B1 B1 B1 B1 B1

1/2001 1/2001 1/2001 1/2001 1/2001 1/2001

Schutte etal. Schneideretal. Hiscocket 31‘ Crinion 6161. Reid 6161. BOdeIl 6161.

6,188,694 B1*

2/2001

F1116 6161. ................. .. 370/402

6,195,705 B1 6,202,114 B1

2/200l Leung 3/2001 Dun et 31‘

5,978,378 A *

11/1999 Van Seters er a1- -------- -- 370/401

6,208,649 B1*

3/2001

K161h ....................... .. 370/392

6,006,258 6,006,264 6,006,272 6,012,090 6,018,619 6,023,724

12/1999 12/1999 12/1999 V2000 V2000 2/2000

6,208,656 6,212,558 6,216,167 6,219,706 6,219,739 6,226,267

3/2001 4/2001 4/2001 4/2001 4/2001 5/2001

HfaSt?I 6161. Antur 6161. Momirov Fan 6161. 1311116161. Spinney 6161.

A A A A A A

Kalajan ColbyetalAravamudan et al. Chung eta1~ Allardetal Bhatia etal-

B1 B1 B1 B1 B1 B1

6,028,848 A

2/2000 Bhatiaetal

6,226,771 B1

5/2001 1111166161.

6,029,203 6,032,194 6,035,105 6,047,325

2/2000 2/2000 3/2000 4/2000

6,230,203 6,243,749 6,243,754 6,243,815

5/2001 6/2001 6/2001 6/2001

KOpefda 6161. Sitaraman 6161. 611611116161. Antur 6161. Chevalier et a1‘

A A A A

Bhatla @131 Gai er 91Mccloghrie er 91' Jain eta1~

B1 B1 B1 B1

6,049,834 A *

4/2000 Khabardar et al. ........ .. 709/242

6,246,669 B1

6/2001

6,052,803 A 6,058,106 A 6,058,431 A

4/2000 Bhatia @131 5/2000 Cudaketal 5/2000 Srisuresh @131

6,249,523 B1 6,252,888 B1 6,253,122 B1

6/2001 HfaSt?I 6161. 6/2001 11116116161. 6/2001 RaZavi 6161.

6,085,238 A *

7/2000 Yuasa et al. ............... .. 709/223

6,256,314 B1

7/2001

Rodrig et a1‘

6,088,356 6,094,435 6,094,659 6,098,172 6,104,696 6,104,700

7/2000 7/2000 7/2000 8/2000 8/2000 8/2000

6,262,976 6,266,707 6,269,099 6,430,621 6,526,052 6,553,028

7/2001 7/2001 7/2001 8/2002 2/2003 4/2003

McNamam BOdeIl 6161. 130161121 6161. Srikanth 6161. Rijhsinghani 6161. Tang et 31‘

A A A A A A

Hendelet al. Hoffman eta1~ Bhatia Cossetal Kadambietal Haddocket al.

B1 B1 B1 B1 B1 B1

6,105,027 A

8/2000 Schneider et 91-

6,614,787 B1*

9/2003 Jain 6161. ................. .. 370/390

6,108,330 A

8/2000 Bhatia 9491

6,614,792 B1

9/2003 Pazy 61 al.

6115378 A 6,118,768 A

9/2000 Hendel er a1~ 9/2000 Bhatia etal-

6,674,760 B1* 7,222,188 B1*

1/2004 Walrand 6161. ........... .. 370/411 5/2007 AIIleS 6161. ............... .. 709/238

6,118,784 6,119,162 6,119,171 6,128,657

A A A A

9/2000 9/2000 9/2000 10/2000

Tsuchiya et a1. Li et al. Alkhatib Okanoya et al.

OTHER PUBLICATIONS

B. Kantor, “Internet Protocol Encapsulation of AX.25 Frames,”

6,131,163 A

10/2000 Wiegel

Request for Comments: 1226, May 1991 (“RFC1226”).

6,141,749 A 6,147,995 A 6,151,316 A

10/2000 Coss et al. 11/2000 Dobbins et al. 11/2000 Crayford et al.

K. Egevang, “The IP Network Address Translator (NAT),” Request for Comments: 1631, May 1994, (“RFC1631”). W. Simpson, “IP in IP Tunneling,” Request for Comments 1853, Oct.

6,151,324 A *

11/2000 B61s616161. .............. .. 370/397

1995, (“RFC1853”).

6,154,446 6,154,775 6,154,839 6,157,647 6,157,955 6,167,052

11/2000 11/2000 11/2000 12/2000 12/2000 12/2000

C. Perkins, “1P Encapsulation Within 1P,” Request for Comments 2003, 061. 1996, (“RFC2003”). K. HamZeh, et al., “Point-to-Point Tunneling Protocol (PPTP),” Request for Comments 2637, Jul. 1999, (“RFC2637”). D. Farinacci, et al., “Generic Routing Encapsulation (GRE),” 1161111661161 (3611111161116 2784, M61. 2000, (“RFC2784”).

A A A A A A

6,167,445 A 6,170,012 B1

Kadambi et al. COSS 61 a1. AIIOW et 31 Hlls?k Narad et a1~ McNeilletal

12/2000 G31 61 al. 1/2001 Coss et al.

* cited by examiner

US. Patent

F

Sep. 7, 2010

u

l4_0

P2

P3

P4

P5

Switch 82

P6

WON/‘9W0 141

US 7,792,058 B1

Backbone Connecting Multiple Switches

Switch S1 P1

Sheet 1 of3

P1

P2

1.5_0 P5

P6

NW9 0 0 0

0

i

i

i

i

i

V

i

142

143

144

145

146

151

152

P3

P4

VLAN A

1 H1 111

11_() \

i

112

113

VLAN B

121

122 VLAN C

H6 131

H7 ' H8 132

133

FIG. 1 (Prior Art)

u

US. Patent

Sep. 7, 2010

Sheet 2 of3

US 7,792,058 B1

Gateway @

L3 Switch 83

E 8N1

8N2

“24>

8N3

“25o VLAN D

H1 \( H2f\ H3 211

212

L0.

213 VLANE

(H1f H21 H3 \ \ \ 241

242

24_0

243 \/

VLAN F

FIG. 2 (Prior Art)

US. Patent

Sep. 7, 2010

Sheet 3 of3

US 7,792,058 B1

INTERNET 301 SUPERVLAN x

SUPER VLAN Y

GATEWAY

&

3%

§_0

A

A

> L3 SWITCH 33

sNs 192.12

Q ‘

VIRTUAL ROUTER INTERFACE

8N6 192.1.3

@

A

305m SN4-192.1.1 V

P I’

_

_

_

_

_

_

_

Q '

_

_

_

_

_

_

_

_

R _

_

_

_



_

_

_

'

_

_

_

_

_



--|

:

1

1

i ,‘g

E]

|

I

H1( H2

: \

: 311

\

\

312

313

SUB-VLAN P

1

Q12

1

192.1.11-3 :

H3

l

l

: :

g

1

SUB-VLAN Q

i

192.1.14-5

1 l

i

\ H4\ H5

'

:

Q

321 322

l

|

i

'

1

l

SUB-VLAN R

I

192.1.1.6-8

E

@

i

{

H6{ H7 H8 1

l

:

\

1

331 332 333

l

: 192.1.1.1-8

SUPER-VLAN Z

8N4 Broadcast Addresses 360 361 --192.1.1.0 All Zeroes 362 -- 192.1.1255

\

All Ones

FIG. 3

i

35 i

_

l

US 7,792,058 B1 1

2

METHOD AND SYSTEM FOR VLAN AGGREGATION

are often referred to as broadcast domains. VLANs avoid

Wasting bandWidth caused by unnecessarily forWarding traf ?c to sWitches for Which there are no potential recipients (i.e. sWitches that do not have ports belonging to that particular

This application is a Continuation of, and claims the bene?t of, application Ser. No. 09/595,608 ?led Jun. 16, 2000, now US. Pat. No. 6,914,905.

VLAN, or that do not connect to hosts belonging to the same

BACKGROUND OF THE INVENTION

VLAN B 120, but does have ports belonging to VLAN C 130.

subnet). For example, With reference to FIG. 1, layer-2 sWitch S2 150 does not have any ports belonging to VLANA 110 or

Thus, traf?c originating fromports belonging to VLANA 110 1. Field of the Invention The present invention relates to the ?eld of virtual local area netWork (VLAN) topologies and intemetWork commu

orVLAN B 120 is not forWarded to layer-2 sWitch S2 150, but traf?c originating from port P6 140 VLAN C 130 is for Warded to layer-2 sWitch S2 150 ports P1 151 and P2 152. The subnet address that is commonly used as the basis for de?ning the layer-3 VLANs is a type of Internet Protocol address (IP address) used to route data packets across hetero

nications technologies. In particular, the present invention relates to an aggregated VLAN netWork architecture used in

forwarding data packets by a LAN sWitch connecting mul tiple VLANs. 2. Background Information and Description of RelatedArt

geneous netWorks. IP addresses are 32-bit numbers that have a tWo-level structure: a netWork number and a host number.

AVLAN is a logical grouping of netWorked host comput

The netWork number uniquely identi?es the netWork through

ers on some other basis than the physical netWork location

(e. g. department, primary application). VLANs alloW net

20

Work managers to more easily manage dynamic netWorks Where the identity and location of the netWork’s users are

requiring access to the Internet has groWn, a third level Was

constantly changing.

introduced into Internet routing protocols to augment the original tWo-level addressing structure. This third level

VLANs can be implemented in a number of different Ways,

depending on the netWork strategy. A prior art traditional layer-2 VLAN is based on a logical grouping of the layer-2 sWitch ports to Which the hosts connect. Alternative prior art

25

de?nes a sub-netWork, or “subnet.”

A subnet address may represent all the hosts at one geo graphic location, in one building, or on the same LAN or

layer-2 VLANs de?ne VLAN membership by the host’s Media Access Control (MAC) layer address. An example of a port-based prior art VLAN is shoWn in FIG. 1. As illustrated,

Which the host connects to the Internet, and the host number uniquely identi?es the address, or location, of the host on that uniquely identi?ed netWork. As the number of netWorks

VLAN. An advantage to dividing a netWork into subnets is that it alloWs an organiZation (such as an ISP) to be connected 30

to the Internet With a single shared netWork address. As a

VLANA 110 is de?ned as the set ofhosts H1 111, H2 112,

consequence, only one IP netWork address need be exported

and H3 113 that respectively connect to layer-2 sWitch S1 140

by routing protocols for all subnets belonging to a particular netWork, thereby reducing the routing overhead of the Inter

ports P1 141, P2 142, and P3 143. VLAN B 120 is de?ned as the set of hosts H4 121 and H5 122 that respectively connect to layer-2 sWitch S1 140 ports P4 144 and P5 145. Prior art second-generation VLANs can also span multiple sWitches

net. Without subnets, an ISP could get multiple connections to 35

the Internet, one for each of its logically separate netWorks,

connected by backbone 100. For example, as illustrated,

but this Would result in an inef?cient and unnecessary use of the limited number of unique netWork numbers, as Well as an

VLAN C 130 is de?ned as the set ofhosts H6 131, H7 132, and H8 133 that respectively connect to layer-2 sWitch S1 140

needed to properly route data packets from one netWork to

ports P6 146 and layer-2 sWitch S2 150 ports P1 151 and P2

unnecessary increase in the siZe of the global routing tables

152.

another. The standard procedure for creating and identifying subnets is provided in Internet Request For Comments (RFC)

Subsequent generations of prior art VLANs are embodied in layer-3 sWitches. Prior art layer-3 VLANs include VLANs based on the protocol type in a multi-protocol environment, or

950. Like VLANs, subnets can be used to contain netWork broadcast tra?ic, i.e. data packets from one subnet can be

40

on a netWork-layer address such as an Internet Protocol (IP) 45 broadcast only to other hosts in the same subnet by using the multicast group, or a subnet address in a Transmission Con appropriate broadcast IP addresses and routing protocols. In

trol Protocol (TCP)/IP netWork environment. An example of a prior art layer-3 VLAN based on subnet address is shoWn in FIG. 2. As illustrated, VLAN D 210 is de?ned as the set of hosts H1 211, H2 212 and H3 213 on subnet SN1 220 that connects to layer-3 sWitch S3 230, Which in turn connects to gateWay 200. VLAN E 240 is de?ned as the set of hosts H4 241, H5 242 and H6 243 on subnet SN2 250 that connects to layer-3 sWitch S3 230, and so forth.

An advantage of prior art VLANs based on layer-3 infor

addition, a data packet can be broadcast to a speci?c subnet. In this Way, a subnet is also considered a broadcast domain. 50

55

mation such as the subnet address, is that it alloWs hosts to

hosts belonging to the same subnet. For this reason, VLANs

rate VLAN based on a unique subnet address Within the ISP’ s oWn IP address netWork space. HoWever, there are a number

of draWbacks to assigning each subscriber their oWn VLAN based on a unique subnet address.

move to a different physical port on the sWitch in the same

VLAN Without having to recon?gure the ho st IP addresses. In an Internet Service Provider (I SP) environment, VLAN mem bership is often based on the subnet address for this reason, among others. An advantage of all prior art VLANs is that the layer-2 or layer-3 sWitch is able to use VLAN membership to contain netWork tra?ic. For example, tra?ic originating on one port is only sWitched to other ports belonging to the same VLAN, or tra?ic originating on one subnet is only sWitched to other

A typical use of the prior art layer-3 VLAN sWitches is in an ISP environment, Where VLAN membership may be based on netWork layer information such as the layer-3 protocol type or layer-3 subnet address as previously described. Tra ditionally, the ISP assigns each of their subscribers to a sepa

60

65

One draWback is that implementations of a subnet address ing scheme must set aside certain special purpose IP addresses that cannot be used for host IP addresses. The special purpose IP addresses include at least tWo different broadcast IP addresses, a default router address (i.e. the address of the default gateWay for the subnet), and, in an ISP environment, at least one IP address for a subscriber node. The tWo broadcast IP addresses that must be set aside are

?xed addresses With functional signi?cance, i.e. they are used to broadcast data packets to the subnet. One is the “all hosts”

US 7,792,058 B1 3

4

address, consisting of the network number, subnet number,

cannot be assigned to a host, but rather must be set aside for

and all ones in the host number ?eld. This address has the

broadcast or other special purposes.)

effect of transmitting the data packet to all of the hosts af?li ated With that subnet. The other is the “this network” address, consisting of the netWork number, subnet number, and all

Standard subnetting protocols require that the subnet mask be stored and compared by the router interface against the

Zeroes in the host number ?eld. This address has the effect of

data packets to determine Whether they can be sent directly to

transmitting the data packet to the subnet only. The broad

the destination on the local netWork or if they must be sent to a gateWay. Therefore, the use of subnets results in an unavoid

casting IP addresses are useful When a host needs to request information but does not knoW exactly Where to get it, or When a host needs to announce information to all other hosts

able amount of subnet mask storage and processing overhead that must be incurred When forWarding and routing data pack

on a subnet.

ets.

As a result of having to set aside these four types of special purpose and broadcast IP addresses, the IP address space

Yet another draWback to assigning each subscriber their oWn individual subnet is the constraints on the number and

overhead of subnets can become quite large, particularly

siZe of subnets imposed by the subnet addressing scheme itself. Since subnets must be de?ned along binary boundaries

When dividing a given IP netWork address space up into several smaller subnets, as is often the case in an ISP envi

ronment. For example, Table 1 illustrates the addressing over head for an ISP that allocates 8 subnets to its subscribers, With each subnet being a /27 netWork (Where the forWard-slash notation refers to the length of the combined netWork number/

that yield host address blocks in poWers of tWo, an ISP can only de?ne as many subnets as Will accommodate the host 20

address space needed by the largest subnet. For example, a / 24 netWork address space (Class C netWork) could be subnetted into 23 or 8/27 subnets, each supporting 25, or 32 hosts, minus

25

the largest subnet requires 50 host addresses, then the /24 netWork address space (Class C netWork) instead can only be divided into 22 or 4/26 subnets, each supporting (26-2), or 62 hosts. Even larger host address spaces, say 500-1000 hosts,

subnet number pre?x of the IP address).

at least the tWo broadcast addresses, for a total of 30 hosts. If TABLE 1 IP Address

# of individual

# of Special Purpose

Pre?x length

Addresses Available

Addresses Required

/27

32 x 8 subnets = 256

4 x 8 subnets = 32

Would need their oWn /22 or /23 subnet carved out of a /l6

netWork address space (Class B netWork). Since lSPs often

As can be seen, each /27 netWork is capable of supporting

service subscribers of varying and unpredictable siZe, assign

only 28 hosts, because 4 of the potentially available host

ing each subscriber an individual subnet can result in

addresses must be set aside for the broadcast addresses, default router, and subscriber node. For the 8 subnets, this results in a greater than 12.5% loss in potential address space

(32/256>